“The Travelers Guide To Wi-Fi Hacking”

  • 0

“The Travelers Guide To Wi-Fi Hacking”

Dear Blast Reader,

Do you stay at hotels when you travel? Do you ever use the hotel internet? Did you know that there may be someone spying on you while you are in your hotel? Did you know that hackers target hotel Wi-fi? Did you know that the hackers that target hotel wi-fi also target traveling business professionals?

 

Hotel wi-fi is targeted and compromised to assist in the delivering of the malicious payload to the selected victims. A ­payload is the part of the malware that performs the malicious action. Those behind the attack continually evolve the malware’s tactics and payload. It is believed that the attackers are exploiting the vulnerabilities in the server software, either by:

  • Gaining remote access.
  • Physically gaining access to the hotel and the hotel’s servers.

 

Now, attackers are using a new form of malware known as the “Inexsmar Attack”. This attack starts with a phishing email.  To make the email look real, the message is tailored to you. This email address you by name, and has real looking documents attached.

 

But, looks can be deceiving. Within this email there is a self-extracting archive package. This is a package that begins the trojan downloader process. A trojan downloader process is a malicious program, usually installed through an exploit or some other deceptive means. Using email attachments the malware is installed onto your computer. Once you are convinced to open the attachment, hackers will then initiate their malware attack.

 

How does the malware go un-detected?

To prevent being detected, the malware is downloaded in stages. These stages include:

  1. Hiding malicious codes and strings by linking malicious code to otherwise unrelated code.
  2. The malware then runs an operation to download the second part of the payload, the trojan malware.

 

So, as your defences improve, it is believed that the multi-stage download for the trojan malware is an evolutionary way to keep the trojan viable.

So, how do you protect yourself?

To protect yourself against this new form of advanced and evolutionary trojan malware, here are a few tips:

  1. Use public wi-fi as little as possible. Hackers exploit public wi-fi in places like coffee shops, restaurants, and hotels.
  2. Use a Virtual Private Network, also known as a VPN. VPNs are encrypted web browsers that hide your IP addresses & your location.

 

If you have any questions about Hacking, Malware, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit out website at www.FDS.Global.


  • 0

“Gone in less than 60 seconds”

Dear Blast readers,

Imagine losing all of your data at once. Losing every single one of your contacts, emails, photos, and documents is scary to even think about. No one ever thinks that they will be the one that is affected Gone in 60 Secondsby data loss, but it can happen to any of us. It can take only seconds.

Not all kinds of data loss are the same and in fact, there are many different types of data loss. The most common types of data loss include:

  • Intentional action
  • Unintentional action
  • Failure

Intentional data loss is the most common and it takes place when a person purposely deletes a program or file from the system.

Unintentional data loss happens when a file or program is deleted unknowingly; this is usually accidental, but it still results in permanent loss of data regardless. Failure is when a system failure or crash is the cause of the data loss. There are multiple types of failures and some common ones include power failures, hardware failures, software crashes, software bugs, and data corruptions.

The causes of data loss due to failure range from power outages to mechanical failure. When a power outage occurs computers and other devices can suffer data loss. This loss of information occurs due to power no longer being supplied to the motherboard of the computer. The motherboard of the computer is similar to a human’s brain. Both require a steady supply of electricity/oxygen to function. When a person is deprived of having oxygen reach his or her brain their body shuts down. When this occurs there is a chance of memory loss. This is similar to what happens when a power outage stops providing electricity to a computer. Mechanical failure is when something internally in the computer or other device no longer allows the computer or device to function properly. There is a myriad of ways for this to occur but the most common way in which this happens is when the computer or device is dropped.

Some of these precautions to prevent Data Loss include:

  1. Protection against power disturbances
  2. Backup files and important data regularly
  3. Protect critical files and applications.
  4. Properly shut down the system

For an informational video on data loss check out FDS Global’s segment on the Help Me Howard TV Show: http://fds.global/multimedia/

If you have any questions about your lost Data or need a specialist in recovering deleted or lost data, contact FDS Global. Visit out website at www.FDS.Global or give our office a call at (954) 727-1957